CVE-2026-21695: CWE-915: Improperly Controlled Modification of Dynamically-Determined Object Attributes in kromitgmbh titra
Titra is open source project time tracking software. In versions 0.99.49 and below, an API has a Mass Assignment vulnerability which allows authenticated users to inject arbitrary fields into time entries, bypassing business logic controls via the customfields parameter. The affected endpoint uses the JavaScript spread operator (...customfields) to merge user-controlled input directly into the database document. While customfields is validated as an Object type, there is no validation of which keys are permitted inside that object. This allows attackers to overwrite protected fields such as userId, hours, and state. The issue is fixed in version 0.99.50.
AI Analysis
Technical Summary
CVE-2026-21695 is a Mass Assignment vulnerability identified in the open-source project time tracking software Titra, specifically in versions prior to 0.99.50. The vulnerability stems from improper control over dynamically-determined object attributes (CWE-915) within an API endpoint that accepts a customfields parameter. This parameter is expected to be an Object, and while its type is validated, the keys within the object are not restricted or validated. The API uses the JavaScript spread operator to merge the customfields object directly into the database document representing a time entry. Because of this, an authenticated attacker can inject arbitrary fields, including protected fields such as userId, hours, and state, effectively bypassing business logic controls designed to prevent unauthorized modifications. This can allow attackers to manipulate time tracking records, potentially altering hours logged or ownership of entries. The vulnerability requires the attacker to be authenticated but does not require additional user interaction. The CVSS v3.1 score is 4.3 (medium severity), reflecting the limited impact on confidentiality and availability but a notable impact on data integrity. No known exploits are reported in the wild as of the publication date. The vulnerability is resolved in Titra version 0.99.50 by implementing proper validation and restriction of keys allowed within the customfields object before merging.
Potential Impact
For European organizations using Titra versions below 0.99.50, this vulnerability poses a risk to the integrity of time tracking data. Attackers with valid credentials can manipulate critical fields such as userId and hours, potentially leading to fraudulent time reporting, payroll errors, or unauthorized access to resources tied to time entries. This can undermine trust in internal controls and compliance with labor regulations. While confidentiality and availability are not directly impacted, the integrity compromise can have financial and operational consequences. Organizations relying on Titra for billing, project management, or workforce tracking may experience data corruption or manipulation, affecting audits and reporting accuracy. The requirement for authentication limits exposure to insider threats or compromised accounts but does not eliminate risk. Given the open-source nature of Titra, organizations customizing or self-hosting the software may be particularly vulnerable if patches are not applied promptly.
Mitigation Recommendations
European organizations should immediately upgrade Titra installations to version 0.99.50 or later, where the vulnerability is fixed. Until upgrading is possible, implement strict server-side validation to whitelist allowed keys within the customfields parameter, rejecting any unexpected or protected fields. Employ role-based access controls to limit which authenticated users can modify time entries and monitor logs for unusual changes to critical fields such as userId, hours, and state. Conduct regular audits of time tracking data to detect anomalies indicative of exploitation. Additionally, enforce strong authentication mechanisms and monitor for compromised credentials to reduce the risk of insider or external attackers gaining access. If feasible, isolate Titra instances within secure network segments and apply application-layer firewalls to detect and block suspicious API requests. Finally, educate users and administrators about the importance of timely patching and secure configuration management for open-source software.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Belgium, Italy
CVE-2026-21695: CWE-915: Improperly Controlled Modification of Dynamically-Determined Object Attributes in kromitgmbh titra
Description
Titra is open source project time tracking software. In versions 0.99.49 and below, an API has a Mass Assignment vulnerability which allows authenticated users to inject arbitrary fields into time entries, bypassing business logic controls via the customfields parameter. The affected endpoint uses the JavaScript spread operator (...customfields) to merge user-controlled input directly into the database document. While customfields is validated as an Object type, there is no validation of which keys are permitted inside that object. This allows attackers to overwrite protected fields such as userId, hours, and state. The issue is fixed in version 0.99.50.
AI-Powered Analysis
Technical Analysis
CVE-2026-21695 is a Mass Assignment vulnerability identified in the open-source project time tracking software Titra, specifically in versions prior to 0.99.50. The vulnerability stems from improper control over dynamically-determined object attributes (CWE-915) within an API endpoint that accepts a customfields parameter. This parameter is expected to be an Object, and while its type is validated, the keys within the object are not restricted or validated. The API uses the JavaScript spread operator to merge the customfields object directly into the database document representing a time entry. Because of this, an authenticated attacker can inject arbitrary fields, including protected fields such as userId, hours, and state, effectively bypassing business logic controls designed to prevent unauthorized modifications. This can allow attackers to manipulate time tracking records, potentially altering hours logged or ownership of entries. The vulnerability requires the attacker to be authenticated but does not require additional user interaction. The CVSS v3.1 score is 4.3 (medium severity), reflecting the limited impact on confidentiality and availability but a notable impact on data integrity. No known exploits are reported in the wild as of the publication date. The vulnerability is resolved in Titra version 0.99.50 by implementing proper validation and restriction of keys allowed within the customfields object before merging.
Potential Impact
For European organizations using Titra versions below 0.99.50, this vulnerability poses a risk to the integrity of time tracking data. Attackers with valid credentials can manipulate critical fields such as userId and hours, potentially leading to fraudulent time reporting, payroll errors, or unauthorized access to resources tied to time entries. This can undermine trust in internal controls and compliance with labor regulations. While confidentiality and availability are not directly impacted, the integrity compromise can have financial and operational consequences. Organizations relying on Titra for billing, project management, or workforce tracking may experience data corruption or manipulation, affecting audits and reporting accuracy. The requirement for authentication limits exposure to insider threats or compromised accounts but does not eliminate risk. Given the open-source nature of Titra, organizations customizing or self-hosting the software may be particularly vulnerable if patches are not applied promptly.
Mitigation Recommendations
European organizations should immediately upgrade Titra installations to version 0.99.50 or later, where the vulnerability is fixed. Until upgrading is possible, implement strict server-side validation to whitelist allowed keys within the customfields parameter, rejecting any unexpected or protected fields. Employ role-based access controls to limit which authenticated users can modify time entries and monitor logs for unusual changes to critical fields such as userId, hours, and state. Conduct regular audits of time tracking data to detect anomalies indicative of exploitation. Additionally, enforce strong authentication mechanisms and monitor for compromised credentials to reduce the risk of insider or external attackers gaining access. If feasible, isolate Titra instances within secure network segments and apply application-layer firewalls to detect and block suspicious API requests. Finally, educate users and administrators about the importance of timely patching and secure configuration management for open-source software.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-01-02T18:45:27.397Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 695eeee107b8a419a7712f38
Added to database: 1/7/2026, 11:40:17 PM
Last enriched: 1/15/2026, 4:38:48 AM
Last updated: 2/7/2026, 3:52:48 AM
Views: 58
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2071: Buffer Overflow in UTT 进取 520W
HighCVE-2026-25762: CWE-400: Uncontrolled Resource Consumption in adonisjs core
HighCVE-2026-25754: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in adonisjs core
HighCVE-2026-25644: CWE-295: Improper Certificate Validation in datahub-project datahub
HighCVE-2026-25804: CWE-287: Improper Authentication in antrea-io antrea
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.